bind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bind package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Memory Leak

<9.18.7-r0
  • H
Reachable Assertion

<9.18.24-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • H
Memory Leak

<9.18.7-r0
  • H
CVE-2022-3080

<9.18.7-r0
  • H
CVE-2024-1975

<9.18.28-r0
  • H
CVE-2023-5679

<9.18.24-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • H
Out-of-bounds Read

<9.18.7-r0
  • M
CVE-2022-2795

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • H
CVE-2024-0760

<9.18.28-r0
  • M
Reachable Assertion

<9.16.6-r0
  • H
Improper Input Validation

<9.16.6-r0
  • L
CVE-2024-4076

<9.18.28-r0
  • L
CVE-2023-50868

<9.18.24-r0
  • H
CVE-2024-1737

<9.18.28-r0
  • H
Use After Free

<9.18.11-r0
  • M
Improper Resource Shutdown or Release

<9.16.4-r0
  • H
CVE-2022-3736

<9.18.11-r0
  • H
Reachable Assertion

<9.18.11-r0
  • H
CVE-2023-4408

<9.18.24-r0
  • M
Improper Privilege Management

<9.16.6-r0
  • M
Reachable Assertion

<9.16.4-r0
  • M
CVE-2023-5680

<9.18.24-r0
  • M
Improper Resource Shutdown or Release

<9.16.27-r0
  • M
HTTP Request Smuggling

<9.16.27-r0
  • H
Out-of-bounds Write

<9.18.19-r0
  • H
Reachable Assertion

<9.16.6-r0
  • M
CVE-2021-25219

<9.16.22-r0
  • H
Reachable Assertion

<9.16.20-r0
  • H
Improper Privilege Management

<9.16.6-r0
  • M
Reachable Assertion

<9.16.15-r0
  • C
Reachable Assertion

<9.16.15-r0
  • H
Reachable Assertion

<9.18.19-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Reachable Assertion

<9.16.15-r0
  • M
Race Condition

<9.14.4-r0
  • H
Buffer Overflow

<9.16.11-r2
  • H
Resource Exhaustion

<9.14.12-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Reachable Assertion

<9.14.7-r0
  • H
Resource Exhaustion

<9.14.8-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<9.12.3_p4-r0
  • H
Insufficient Verification of Data Authenticity

<9.14.7-r0
  • M
Reachable Assertion

<9.14.12-r0
  • H
Reachable Assertion

<9.14.1-r0
  • H
Reachable Assertion

<9.12.1_p2-r0
  • M
Incorrect Permission Assignment for Critical Resource

<9.12.3_p4-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.14.1-r0
  • H
Use After Free

<9.11.2_p1-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Reachable Assertion

<9.11.0_p5-r0
  • H
Information Exposure

<9.12.2_p1-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • M
Reachable Assertion

<9.12.1_p2-r0
  • H
Missing Release of Resource after Effective Lifetime

<9.12.3_p4-r0
  • H
Reachable Assertion

<9.12.2_p1-r0